2009 International Conference on Management and Service Science 2009
DOI: 10.1109/icmss.2009.5301451
|View full text |Cite
|
Sign up to set email alerts
|

Role-Based Access To Portable Personal Health Records

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…Generally two main techniques are used to secure health records: encryption and access control, being combined most of the time. However, pure access control approaches [3,29] do not provide the needed protection as we can not trust the EHR server where the access control is enforced.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally two main techniques are used to secure health records: encryption and access control, being combined most of the time. However, pure access control approaches [3,29] do not provide the needed protection as we can not trust the EHR server where the access control is enforced.…”
Section: Related Workmentioning
confidence: 99%
“…Encryption and access control create synergies for the benefit of system security. Some approaches [3,29] find access control alone to be adequate. However, neither access control nor encryption alone can guarantee the security of EHRs by themselves.…”
Section: Relationship To Access Controlmentioning
confidence: 99%
“…However, they mostly do not discuss architectural details. HealthPass [9,10] is a mobile-based PHR system that enables the exchange of PHR data with a physician at the pointof-care. The system uses a Health Certificate Authority to authenticate the entity (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…The goal is to have strong security features to manage independently administrated domains the mainstream commerce systems for which it was designed. In [13], RBAC model is used to implement a secure access policy in Electronic health information systems. This system is designed to offer better health care services for patients and to help doctors and other health care workers to treat and diagnose diseases.…”
Section: Introductionmentioning
confidence: 99%
“…With respect to [22], the above techniques don't give the consistency verification of policies. Some more important works have used Colored Petri Nets [11,12,13,14,22] where the coverability tree (or graph) is used to analyze some properties and the consistency of the RBAC policies. We will present a more detailed discussion about these last works in section two.…”
Section: Introductionmentioning
confidence: 99%